Search results for: Juryon Paik
Lecture Notes in Computer Science > Progress in WWW Research and Development > Data Mining and Knowledge Discoverty > 93-98
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2011 > Session on Approaches or Methods of Security Engineering (AMSE 2011) > 437-446
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Group-Oriented Security > 158-176
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2011 > Workshop on Mobile Sensor and Its Applications (MSA 2011) > 123-132
Lecture Notes in Computer Science > Computational Science – ICCS 2006 > Computational Methods for Financial Markets > 356-363
Lecture Notes in Computer Science > Intelligent Data Engineering and Automated Learning - IDEAL 2005 > Data Mining and Knowledge Engineering > 1-8
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2009 > Workshop on Security and Privacy in Pervasive Computing Environments (SPPC 2009) > 173-181
Lecture Notes in Computer Science > Human Interface and the Management of Information. Interacting with Information > Security and Privacy > 339-348
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Ubiquitous Web Systems and Intelligence Workshop > 936-945
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Ubiquitous Application and Security Service (UASS 2006) > 456-465
Information Sciences > 2011 > 181 > 1 > 234-238
IEEE Communications Letters > 2009 > 13 > 3 > 205 - 207
Information Sciences > 2007 > 177 > 23 > 5441-5467